Login / Signup
Algebraic Attacks on Clock-Controlled Cascade Ciphers.
Kenneth Koon-Ho Wong
Bernard D. Colbert
Lynn Margaret Batten
Sultan Al-Hinai
Published in:
INDOCRYPT (2006)
Keyphrases
</>
chosen plaintext
stream cipher
block cipher
high speed
countermeasures
power consumption
data sets
malicious users
attack detection
malicious attacks
security threats
secret key
higher order
neural network
real time
image watermarking
digital watermarking
security protocols
traffic analysis
watermarking algorithm